Security analysis of menstruation cycle tracking applications using static, dynamic and machine learning techniques

被引:2
|
作者
Deverashetti, Mounika [1 ]
Ranjitha, K. [1 ]
Pradeepthi, K., V [1 ]
机构
[1] CR Rao Adv Inst Math Stat & Comp Sci, Hyderabad, Telengana, India
基金
中国国家自然科学基金;
关键词
Period/menstruation cycle tracking apps; Android apps; Static analysis; Dynamic analysis; Permission based; Machine learning; FORENSIC ANALYSIS; ANDROID APPS;
D O I
10.1016/j.jisa.2022.103171
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
There have been many incidents in the past, where user's private information, health and vitals, shared to a mobile app have been disclosed. In this paper, we consider Menstruation Cycle Tracking Android apps, and analyse their security features to understand if the app developers have taken adequate care to avoid such incidents of breach or disclosure. These apps store extremely personal information of women and need to take security very seriously. We have initially applied Static Analysis techniques on these apps, and understood the various loopholes from the developer's prospective. Moreover, we used Dynamic Analysis techniques to further scrutinise the apps and exploit the discovered vulnerabilities. We found many apps are not observant in implementing minimal security features. Further, we propose a machine learning based-Ranking and Extraction of Android Permissions (REAP) framework, where we extract the permissions of these apps and apply Classification and Clustering algorithms to aid in identifying apps that are seeking more permissions and are potentially more risky. Classification accuracy of 94.52% was achieved using Naive Bayes classifier. Menstruation cycle tracking apps carry extremely private information, however, the app developers, sometimes, fail to provide a secure environment to the end-users.
引用
收藏
页数:13
相关论文
共 50 条
  • [41] iABC: Towards a hybrid framework for analyzing and classifying behaviour of iOS applications using static and dynamic analysis
    Bhatt, Arpita Jadhav
    Gupta, Chetna
    Mittal, Sangeeta
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 41 : 144 - 158
  • [42] Evaluation of Machine Learning Techniques for Security in SDN
    Ahmad, Ahnaf
    Harjula, Erkki
    Ylianttila, Mika
    Ahmad, Ijaz
    2020 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2020,
  • [43] Machine learning-based physical layer security: techniques, open challenges, and applications
    Anil Kumar Kamboj
    Poonam Jindal
    Pankaj Verma
    Wireless Networks, 2021, 27 : 5351 - 5383
  • [44] Wind-Induced Dynamic Critical Response in Buildings Using Machine Learning Techniques
    Conceicao, Rodolfo S.
    Evangelista Junior, Francisco
    BUILDINGS, 2024, 14 (10)
  • [45] Machine learning-based physical layer security: techniques, open challenges, and applications
    Kamboj, Anil Kumar
    Jindal, Poonam
    Verma, Pankaj
    WIRELESS NETWORKS, 2021, 27 (08) : 5351 - 5383
  • [46] Credit Risk Analysis Using Machine Learning Techniques
    Shiv, S. J.
    Murthy, Srinivasa
    Challuru, Krishnaprasad
    2018 FOURTEENTH INTERNATIONAL CONFERENCE ON INFORMATION PROCESSING (ICINPRO) - 2018, 2018, : 214 - 218
  • [47] Analysis of Software Vulnerabilities Using Machine Learning Techniques
    Diako, Doffou Jerome
    Achiepo, Odilon Yapo M.
    Mensah, Edoete Patrice
    E-INFRASTRUCTURE AND E-SERVICES FOR DEVELOPING COUNTRIES (AFRICOMM 2019), 2020, 311 : 30 - 37
  • [48] Analysis of Endoscopy Video Using Machine Learning Techniques
    Saraf, Santosh S.
    Udupi, G. R.
    Hajare, Santosh D.
    JOURNAL OF MEDICAL IMAGING AND HEALTH INFORMATICS, 2012, 2 (02) : 97 - 101
  • [49] Internet of Things (IoT) Security Enhancement Using XGboost Machine Learning Techniques
    Doghramachi, Dana F.
    Ameen, Siddeeq Y.
    CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 77 (01): : 717 - 732
  • [50] Tracking User Application Activity by using Machine Learning Techniques on Network Traffic
    Fathi-Kazerooni, Sina
    Kaymak, Yagiz
    Rojas-Cessa, Roberto
    2019 1ST INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE IN INFORMATION AND COMMUNICATION (ICAIIC 2019), 2019, : 405 - 410